Abnormal Behavior Detection in Large Environments
Offered By: YouTube
Course Description
Overview
Explore abnormal behavior detection in large environments through this 50-minute conference talk from GrrCon 2016. Delve into defense strategies, attack patterns, and initial intrusion techniques. Learn about exploitation methods, including HTML attacks and PowerShell injection. Discover the use of invoke obfuscation, honey tokens, and Responder. Examine SCT files, persistence hooks, and service creations. Understand the importance of application whitelisting and various mitigation techniques. Gain insights into the concept of "Purple Time" and its relevance in cybersecurity.
Syllabus
Intro
Abnormal Behavior Detection
Defense
Understanding Attack Patterns
Initial Intrusion
Exploitation Methods
HTML Attack
PowerShell Injection
Invoke obfuscation
Honey tokens
Responder
SCT Files
Persistence hooks
Service creations
Application whitelisting
Mitigations
Purple Time
Related Courses
Network SecurityRochester Institute of Technology via edX Network Security
Georgia Institute of Technology via Udacity Real-Time Cyber Threat Detection and Mitigation
New York University (NYU) via Coursera Information security - IV
Indian Institute of Technology Madras via Swayam Cyber Security
CEC via Swayam